Try our new research platform with insights from 80,000+ expert users
Security Analyst at Secure-24
MSP
Top 5
A stable and fast solution with an easy-to-use user interface and useful threat intelligence
Pros and Cons
  • "The UI is easy to use."
  • "The tool must provide IP-blocking features."

What is our primary use case?

We use the solution to build zero-trust networks. We use it to block everything except the trusted URLs. We get a bunch of URLs from the customers, whitelist them in the solution, and everything else is blocked automatically.

An URL must be whitelisted for users to access it. When a customer tells us they need a particular URL, we analyze it and send it for approval. Once it is approved, we whitelist the URL for the user. The solution is useful for zero-trust and DLP.

What is most valuable?

The UI is easy to use. All the options are accessible.

What needs improvement?

The product has limited features. We only have the option to monitor URLs and HTTPS logs. The tool must provide IP-blocking features.

For how long have I used the solution?

I have been using the solution for more than three years.

Buyer's Guide
Zscaler Zero Trust Exchange Platform
November 2024
Learn what your peers think about Zscaler Zero Trust Exchange Platform. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
824,067 professionals have used our research since 2012.

What do I think about the stability of the solution?

The tool is stable. For the past three years, I haven't seen it break down. I rate the stability a ten out of ten.

What do I think about the scalability of the solution?

I rate the tool’s scalability a seven out of ten. When we search for logs, it doesn’t take much time. It’s quite fast, even if we have a lot of logs. We use more than 1000 URLs in a day. Getting the logs in real-time is quite important. Four of our customers are using the solution. We have 30,000 to 40,000 users.

Which solution did I use previously and why did I switch?

I have used Symantec DLP.

How was the initial setup?

The engineering team sets up the tool. We use the tool to analyze user behavior during incidents. We can see whether URLs accessed by the users were approved by the organization.

What's my experience with pricing, setup cost, and licensing?

The product is a bit expensive.

What other advice do I have?

We take support from Zscaler and provide the service to our clients. We are partners. People who want to use the product must explore the options. We can do multiple things for a single URL. We can restrict URLs to only access the GET request or POST request. We can do HTTP control and SSL inspection. We can also access the threat intel. We can look up a URL and get the details in real-time. Overall, I rate the tool an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner/Customer
PeerSpot user
Lead Information Technology Specialist at ZF Group
Real User
Top 20
Offers features like VPN, secure connections, and firewall functionalities and good stability
Pros and Cons
  • "It does the job. What it is needed for. I can use it for VPN, I can use it for secure connections, I can use it as a firewall. So the solution does the job."
  • "It has a limitation, if you are creating a rule or something for a web application or something, you could only add five users, not more than that. Five or four users are only included in a rule. If you want to create a rule for more than five or four users, you have to go through other methods, not particularly with the application. Working within the application with this method would be quite easy as compared to listing a URL or a normal IP address."

What is our primary use case?

The main purpose was to use it as a zero-trust solution. Or also to have control over the inbound and outbound traffic coming and going through the end user's device.

What is most valuable?

It does the job. What it is needed for. I can use it for VPN, I can use it for secure connections, I can use it as a firewall. So the solution does the job.

What needs improvement?

It has a limitation, if you are creating a rule or something for a web application or something, you could only add five users, not more than that. Five or four users are only included in a rule. If you want to create a rule for more than five or four users, you have to go through other methods, not particularly with the application. Working within the application with this method would be quite easy as compared to listing a URL or a normal IP address.

For how long have I used the solution?

I have been using this solution for one and a half year. 

What do I think about the stability of the solution?

It is a stable product.

What do I think about the scalability of the solution?

It is a scalable solution. Around 300 end users are using this solution.

How are customer service and support?

The customer service and support have a good SLA. They return queries on time.  

How would you rate customer service and support?

Positive

What other advice do I have?

I would say go ahead because it has a quite friendly interface. It has a lot of stuff you can do. If you are using the old infrastructure technique, you would love it because you can control most of your endpoints network on the device by a single interface. That is the Zscaler.

Overall, I would rate the solution an eight out of ten. 

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Zscaler Zero Trust Exchange Platform
November 2024
Learn what your peers think about Zscaler Zero Trust Exchange Platform. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
824,067 professionals have used our research since 2012.
reviewer1393458 - PeerSpot reviewer
IT Security & Operations Manager at a wholesaler/distributor with 5,001-10,000 employees
Real User
Filters well, with good whitelisting/blacklisting capabilities and installs easily on endpoints
Pros and Cons
  • "Overall, the solution does a pretty good job at web filtering."
  • "It needs to offer SSO, single sign-on, and items of that nature."

What is our primary use case?

The tool is a proxy service that provides inspection of URL filtering for internet access. We have probably 20 or 30 different vendors that we work with in regards to carriers. These are all providers that we use that work in conjunction with that platform. It's an agent that's installed on all of our endpoints. We whitelist and blacklist and we allow certain websites, et cetera, using this product.

What is most valuable?

Overall, the solution does a pretty good job at web filtering.

The solution does a good job of allowing us to choose what to whitelist and blacklist.

The agent easily installs on the endpoints.

What needs improvement?

The solution needs to offer better scalability.

The product needs SAML integration. That's something they should work to add in future releases.

It needs to offer SSO, single sign-on, and items of that nature.

The product needs greater zero-trust. They need to focus more on zero-trust relationships.

For how long have I used the solution?

I have been using the solution for about three and a half years at this point. It's been a while. 

What do I think about the scalability of the solution?

The scalability is a weak point right now. Its scaling capabilities are lacking, and we'd like to see that improve in the future.

How was the initial setup?

The solution is basically an agent that is installed on endpoints in order to provide security. It's not overly complicated.

What other advice do I have?

We are not using the latest version of the solution. Currently, for example, we are one version back on that, as we don't typically do the most current version.

I'd rate the solution at a nine out of ten. We've, for the most part, been quite happy with its capabilities and the level of security it provides to us.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Global Knowledge Based Engineering Manager at Tenneco Inc.
Real User
Big lack of support for SCMP network systems and the bandwidth speeds are limited
Pros and Cons
  • "We don't need to connect anymore. It is automatically connected when you log on in Windows."
  • "SCMP support would be one of the biggest improvements in my opinion. More speed improvements are also required."

What is our primary use case?

When I am outside of the company, I use Zscaler Private Access. I use Zscaler Private Access in the home, hotel, or wherever for remote working. It is a VPN.

How has it helped my organization?

We have a minimum of three to five thousand users minimum supported with Zscaler Private Access. It could be much more. They use it in the same way that I am using it. 

We have more solutions for connection with third party suppliers where we include contacts.

What is most valuable?

The only advantage I see is no more connection is required by the users. It is attached to the single-side logon with our key directory. That is the most valuable feature. 

With AT&T, we had another way to connect with the user. We had no single-side logon solution. Zscaler Private Access is a single-side logon solution.

We don't need to connect anymore. It is automatically connected when you log on in Windows. That is the only advantage I see because it is a bit slower.

What needs improvement?

We are supporting our supply-chain in India. Our connections through Zscaler have degraded drastically. Improvements are required in speed and bandwidth. 

The biggest disadvantage is there are no SCMP network layers available. The older network connection checks cannot be done because it's not included in the solution. 

We are programming our old solutions and they have not included support for legacy Windows. This is a huge disadvantage for me.

SCMP support would be one of the biggest improvements in my opinion. More speed improvements are also required. Very simple. 

If I need to monitor a third party supplier, if I have no SCMP, I cannot do the monitoring.

Some data may be cached if it is not available. This another important issue we have which needs to be improved, i.e. when the availability is not given the cache should not be used. 

At least we need Zscaler Private Access to make sure that the cache represents what is available to the users.

For how long have I used the solution?

We have only three months experience with Zscaler Private Access.

How are customer service and technical support?

I am not involved in technical support for Zscaler Private Access. I create a ticket in our technical system and wait for an answer. I am still a project leader for this.

How was the initial setup?

Everything is predefined so there is no mistake possible. Zscaler Private Access is attached to the active directory user. It is very easy. It is good.

We deployed with a system and it went very quick. It's a cloud solution. There is no private software to set up. Zscaler Private Access is quite easy and convenient in this way.

What about the implementation team?

The installation was done at the global level. We did not use a reseller. Our company has since been merged with another corporation. We have now ninety thousand employees.

Which other solutions did I evaluate?

I was not involved in the choice of the solution. This was decided by our global network people.

What other advice do I have?

On a scale from one to ten, I would rate Zscaler Private Access at only a three or four. 

The biggest disadvantage is the lack of SCMP network systems.  Also, the quality of the bandwidth is limited. We use normal internet access, not a fiber-optic line. 

The difference is huge, like flying in first-class vs. economy class. We stay in the economy class. The commercial company is saving money, but the end-user has lost the experience.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Maksym Toporkov - PeerSpot reviewer
Head of Research And Development at Quipu GmbH
Real User
Top 5
A comprehensive and flexible solution for digital experience monitoring and protecting against various threats with seamless integration, straightforward implementation and versatile security features
Pros and Cons
  • "The agent's versatility is notable, used for digital experience monitoring to collect valuable endpoint metrics for troubleshooting."
  • "Occasionally, there are certain delays in report generation."

What is our primary use case?

I primarily use it for conducting security incident investigations and generating security reports. It serves as a valuable tool in analyzing and responding to security events, and its capabilities are instrumental in producing comprehensive reports on the security status of the network.

How has it helped my organization?

It proved to be invaluable in addressing our challenge of not having a rigid perimeter. With employees working from various locations, the need to move away from VPN reliance became apparent. Following thorough assessments, we opted to continue using it as our cloud Web Access solution.

What is most valuable?

It stands out for its seamless integration with various security solutions, such as EDR, SOAR, etc. The implementation process is straightforward, requiring minimal ongoing maintenance. The desktop agent enhances endpoint protection against zero-day vulnerabilities, providing a safeguard until patches are released. Its adaptability extends beyond a single solution, allowing integration with different models and solutions. The alert detection system and additional security features add an extra layer of appeal. The flexibility to start with one aspect and expand within a single vendor is advantageous. The agent's versatility is notable, used for digital experience monitoring to collect valuable endpoint metrics for troubleshooting. The security browser function distinguishes between known safe sites and potentially suspicious ones, ensuring a secure browsing experience. Unfamiliar websites are run in the Zscaler Cloud, isolating them from the endpoint and preventing potential phishing or malicious scripts from reaching the user's device.

What needs improvement?

Occasionally, there are certain delays in report generation. Clicking on a link, I found myself waiting for an unpredictable duration—sometimes as long as thirty seconds to a minute—until the report was ready.

For how long have I used the solution?

I have been working with it for over a year.

What do I think about the stability of the solution?

There have been instances where certain software or applications on the user side didn't work smoothly. This posed an additional onboarding challenge, requiring collaboration with technical support to analyze logs, generate reports, and identify necessary exclusions or policies to rectify the issue. Once addressed, the applications resumed normal functioning.

What do I think about the scalability of the solution?

It's highly scalable, and I frequently receive notifications about new data center expansions. With around five thousand endpoints, I am not aware of any problems that have been discussed as requiring a change of solution.

What about the implementation team?

I gained access to the web console, and within an hour, I comprehended its capabilities, which I found appealing. Beyond predefined reports, the platform enables users to retrieve any imaginable information. Creating a visual search request is a straightforward process, delivering the required data through a user-friendly interface.

What was our ROI?

The implementation has effectively addressed numerous challenges related to ensuring a secure internet connection for users.

Which other solutions did I evaluate?

When we conducted assessments, Cisco and Microsoft were also considered. However, at that time, Cisco was in the initial stages of developing their solution, and Microsoft had just released their web security gateway.

What other advice do I have?

When making a decision, choosing a market leader is often advisable. While the initial cost may be slightly higher, the long-term savings in both time and money, as well as the reduction in operational costs, often outweigh the investment. Opting for a leading product can also mitigate potential issues and challenges that might arise with newer or less-established alternatives. Overall, I would rate it eight out of ten.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Njabulo Radebe - PeerSpot reviewer
Snr Presales Cyber Security Engineer: Palo Alto| F5 at Westcon-Comstor
Real User
Top 10
Comprehensive and scalable security, seamlessly integrating with diverse network environments, providing consistent protection, and adapting to the evolving landscape of cloud adoption
Pros and Cons
  • "The most valuable feature is its seamless integration capabilities, streamlining the process by eliminating the need for extensive installations."
  • "Having a Zscaler-specific device could streamline this process and provide a more consistent user experience across diverse branches."

What is our primary use case?

It serves as a globally distributed solution, differing significantly from MPLS. Unlike traditional firewalls, it seamlessly accommodates cloud services and enables remote work from any location. The product's global distribution across the cloud facilitates internal access with the necessary licenses. Whether connecting from a branch office, on-premises solution, private data system, public data center, or the cloud, the platform ensures consistent and robust security protection throughout the entire infrastructure.

What is most valuable?

The most valuable feature is its seamless integration capabilities, streamlining the process by eliminating the need for extensive installations. Users can connect to the SaaS solution by simply installing the necessary apps. This includes the flexibility to connect with any firewall or router capable of setting up IPSec, providing users the freedom to choose their preferred hardware. This versatility extends beyond Zscaler-specific applications or devices, making it compatible with a range of SD-WAN solutions, such as Cisco Meraki, Palo Alto, and Juniper.

What needs improvement?

A suggestion for improvement is the development of their own proprietary SD-WAN device. Currently, the experience can vary when integrating cloud protection with different vendors, such as Palo Alto, Meraki, or Juniper. Having a Zscaler-specific device could streamline this process and provide a more consistent user experience across diverse branches. Additionally, expanding their offerings to include solutions like SIEM, similar to competitors, could enhance their portfolio and cater to clients interested in a broader range of services.

For how long have I used the solution?

I have been working with it for two years.

What do I think about the stability of the solution?

It is highly reliable and ensures that users receive optimal performance regardless of their physical location, creating a more seamless and user-friendly experience.

How was the initial setup?

The initial setup was straightforward.

What's my experience with pricing, setup cost, and licensing?

The perception of cloud services being expensive is often a result of the initial migration costs, especially when transitioning from traditional and limited MPLS environments. In the long run, cloud services are not inherently costly. If you're starting fresh and adopting a cloud-first approach from the beginning, the perceived expense is considerably less significant.

What other advice do I have?

It is not economically viable for individual users but is highly recommended for companies with a substantial user base, multiple branches, extensive cloud operations, and remote employees. The solution offers enhanced protection across network, on-premises, and cloud environments, making it valuable for enterprises adapting to the evolving landscape of cloud adoption and seeking comprehensive security and networking benefits. Overall, I would rate it nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer:
PeerSpot user
Arnab - PeerSpot reviewer
Data Analyst at a tech services company with 11-50 employees
Real User
Top 5Leaderboard
Highly scalable and effective policy implementation
Pros and Cons
  • "On DLP terms, Zscaler Cloud DLP ensures that data doesn't go outside of the organization. So on the network level, Zscaler does a pretty good job."
  • "Another area of improvement is implementation through non-client connectors. The solution can be implemented in two ways. One uses the back file; the other one uses client connectors. So the client connector is pretty fast, but when it comes to non-client connectors and procedures, it's kind of delayed and slow."

What is our primary use case?

It pretty much covers, like, if you implement it, it's going to cover, like, 80 to 90% of real estate for the organization.

How has it helped my organization?

On DLP terms, Zscaler Cloud DLP ensures that data doesn't go outside of the organization. So on the network level, Zscaler does a pretty good job.

What is most valuable?

The solution doesn't do a very good job of detection, but they definitely do a very good job of implementing the policies.

What needs improvement?

There is room for improvement in detection. From the detection perspective, like, how it detects the violations.

Another area of improvement is implementation through non-client connectors. The solution can be implemented in two ways. One uses the back file; the other one uses client connectors. So the client connector is pretty fast, but when it comes to non-client connectors and procedures, it's kind of delayed and slow. The policies don't reflect very soon. It takes, like, a day and, like, hours to get implemented. But if it's a client connector, it takes, like, two minutes. It's just so good.

In future releases, I would like to see two things. It's not more of a feature but more like an enhancement. So I would like to see an enhancement in their proximity when detecting credit card details and past support details, and PII data.

Another area of improvement is support. 

For how long have I used the solution?

I have been using this solution for around nine months. I use the latest version 6.2.

What do I think about the stability of the solution?

I would rate the stability an eight out of ten.

What do I think about the scalability of the solution?

Scalability is pretty good. I would rate the scalability a nine out of ten. 

How are customer service and support?

There is room for improvement in support. 

How would you rate customer service and support?

Neutral

How was the initial setup?

The initial deployment is pretty easy. That's pretty straightforward.

What was our ROI?

We have definitely seen an ROI. 

What's my experience with pricing, setup cost, and licensing?

The price is a little bit on the higher side, especially if you are going to add, like, packs or bundles to your subscription. But otherwise, it's pretty decent.

What other advice do I have?

I would suggest to keep your policies simple. Don't complicate them because it depends on your organization and how you set it up. So once you are doing it, just keep it clean and simple.

Overall, I would rate the solution an eight out of ten. 

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Narasimhan V S - PeerSpot reviewer
Technical Manager at Valuepoint Systems
Real User
Provides safe access and the ability to secure data in terms of confidentiality
Pros and Cons
  • "Users get direct secure access to applications over the internet."
  • "The DX layer could be better if it had improved visibility."

What is our primary use case?

The primary use case of SASE is for secure access, whether for public internet or private applications. Post-Covid, users are connecting from everywhere and need secure access with a good user experience. We deploy this solution to our customers. 

What is most valuable?

Safe access is a key valuable feature. The ability to secure data in terms of confidentiality is also a great feature. Instead of going through existing gateways or their networks, users get direct secure access to applications over the internet. Connectivity to the applications is also great.

What needs improvement?

Although it's good, the DX layer could be better if it had improved visibility. There is definitely scope to enhance that aspect. Some customers are looking for application connectivity over zero trust which is a concern for them. I believe it's in the Zscaler roadmap and we hope to see that in the near future. 

For how long have I used the solution?

I've been providing this solution to our customers for a decade. 

What do I think about the stability of the solution?

There were initially some stability issues but the solution is now very stable.

What do I think about the scalability of the solution?

The scalability is great and it's the biggest advantage of having any SaaS solution. We have all categories of customers and a mid-market enterprise board. Our client companies have users that range anywhere from 500 up to 5,000. 

How was the initial setup?

The initial setup is not complex at all and easy to handle. Customers have to familiarize themselves with the solution and try it out themselves. Deployment usually takes a couple of weeks although it depends on use cases and complexity. There may also be dependencies from the network side which can add to the deployment time.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Buyer's Guide
Download our free Zscaler Zero Trust Exchange Platform Report and get advice and tips from experienced pros sharing their opinions.
Updated: November 2024
Buyer's Guide
Download our free Zscaler Zero Trust Exchange Platform Report and get advice and tips from experienced pros sharing their opinions.